Which of the following Is a common, passive reconnaissance technique employed by penetration testers in the early phases of an engagement?
Open-source intelligence
Port scanning
Pivoting
Exploit validation
Submit